NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3
zadetkov: 21
1.
  • User concerns regarding inf... User concerns regarding information sharing on social networking sites: The user's perspective in the context of national culture
    Mutambik, Ibrahim; Lee, John; Almuqrin, Abdullah ... PloS one, 01/2022, Letnik: 17, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Information sharing via social networking systems (SNS) is a common practice among academics, as well as others, that brings substantial benefits. At the same time, privacy concerns are widespread ...
Celotno besedilo

PDF
2.
  • Crowd Management Intelligen... Crowd Management Intelligence Framework: Umrah Use Case
    Halboob, Waleed; Altaheri, Hamdi; Derhab, Abdelouahid ... IEEE access, 2024, Letnik: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Crowd management is crucial for countries and organizations as it can lead to severe consequences or serious safety concerns. Most of the existing research focus on addressing limited crowd ...
Celotno besedilo
3.
  • Crowd Congestion Forecastin... Crowd Congestion Forecasting Framework Using Ensemble Learning Model and Decision Making Algorithm: Umrah Use Case
    Derhab, Abdelouahid; Mohiuddin, Irfan; Halboob, Waleed ... IEEE access, 2024, Letnik: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Forecasting crowd congestion is a critical aspect of crowd management, particularly in dynamic and densely populated areas, such as urban centers, events, or pilgrimage sites. In this paper, we ...
Celotno besedilo
4.
  • A Hybrid Linguistic and Kno... A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media
    Seddari, Noureddine; Derhab, Abdelouahid; Belaoued, Mohamed ... IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    The rapid development of different social media and content-sharing platforms has been largely exploited to spread misinformation and fake news that make people believing in harmful stories, which ...
Celotno besedilo
5.
  • Compliance with Saudi NCA-E... Compliance with Saudi NCA-ECC based on ISO/IEC 27001
    Alsahafi, Tahani; Halboob, Waleed; Almuhtadi, Jalal Tehnički vjesnik, 10/2022, Letnik: 29, Številka: 6
    Journal Article, Web Resource
    Recenzirano
    Odprti dostop

    Organizations are required to implement an information security management system (ISMS) for making a central cybersecurity framework, reducing costs, treating risks, and so on. Several ISMS ...
Celotno besedilo
6.
Celotno besedilo
7.
  • Increasing Continuous Engag... Increasing Continuous Engagement With Open Government Data: Learning From the Saudi Experience
    Liu, Yulong David; Mutambik, Ibrahim; Almuqrin, Abdullah ... Journal of global information management, 01/2023, Letnik: 31, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    A number of countries are today implementing open government data (OGD) initiatives. Yet many of these initiatives are failing to attract the levels of continuous use they need to deliver an ...
Celotno besedilo
8.
  • User concerns regarding information sharing on social networking sites: The user's perspective in the context of national culture
    Ibrahim Mutambik; John Lee; Abdullah Almuqrin ... PloS one, 01/2022, Letnik: 17, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Information sharing via social networking systems (SNS) is a common practice among academics, as well as others, that brings substantial benefits. At the same time, privacy concerns are widespread ...
Celotno besedilo

PDF
9.
  • Privacy Levels for Computer... Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation
    Halboob, Waleed; Mahmod, Ramlan; Udzir, Nur Izura ... Procedia computer science, 2015, 2015-00-00, Letnik: 56
    Journal Article
    Recenzirano
    Odprti dostop

    Computer forensics and privacy protection fields are two conflicting directions in computer security. In the other words, computer forensics tools try to discover and extract digital evidences ...
Celotno besedilo

PDF
10.
  • Privacy policies for comput... Privacy policies for computer forensics
    Halboob, Waleed; Mahmod, Ramlan; Udzir, Nur Izura ... Computer fraud & security, August 2015, 2015-08-00, Letnik: 2015, Številka: 8
    Journal Article
    Recenzirano

    Privacy policies are required by most, if not all, existing privacy acts to make clear how private data are collected, used and disclosed. They are used as a guideline by the data collector to ...
Celotno besedilo
1 2 3
zadetkov: 21

Nalaganje filtrov